Skip to main content Skip to search
Get a Free Trial
Blog

About Jamison Utter

Jamison Utter
Jamison Utter

Jamison Utter is a security practitioner with over twenty years in the trenches.


Recent Posts By the Author

AI

March 17, 2026

The Ultimate Guide to LLM Security in 2026

Large language models are no longer experimental tools running in isolated environments. They are embedded directly into production systems across enterprises: customer support…

September 15, 2025

The Failure of Attack-Centric Cybersecurity: A Veteran's Perspective

As a 20-year veteran of the cybersecurity industry–a career spanning both legitimate penetration testing and a former life as a blackhat–I’ve seen first-hand…

AI

May 28, 2025

Enabling Secure, High-performance Infrastructure for AI and LLM Environments

Artificial Intelligence has been part of the technology landscape for decades, but recent developments in GPU processing power have accelerated its evolution and…

AI

April 24, 2025

How Artificial Intelligence is Changing the Game in Cybersecurity

Cybersecurity isn’t about building a bigger wall. It’s about building a smarter system that adapts faster than the threat evolves. Let’s cut through…

AI

February 13, 2025

The Dangers of Rushing into AI Adoption: Lessons from DeepSeek

As organizations race to adopt the latest advancements in artificial intelligence, DeepSeek serves as a cautionary tale about the potential dangers of rushing…

November 15, 2024

The Strategic Advantage of Hybrid DDoS Protection: Cost Efficiency and Enhanced Control

In the digital age, distributed denial of service (DDoS) attacks pose a significant threat to organizations, potentially leading to service disruptions and financial…

November 12, 2024

Why Bot Protection Matters

In the digital era, websites are increasingly vulnerable to a variety of automated threats. These threats, executed by malicious bots, can lead to…

October 23, 2024

The Need for Next-Generation Web Application Firewalls (WAFs) in Modern Threat Landscape

In today's ever-evolving threat landscape, organizations face numerous security challenges that necessitate a shift from traditional web application firewalls (WAFs) to next-generation solutions.…

AI

September 24, 2024

The Machine War Has Begun: Cybercriminals Leveraging AI in DDoS Attacks

In the digital landscape, the integration of Artificial Intelligence (AI) into cybercriminal activities has marked the beginning of a new era of threats.…

July 16, 2024

The Importance of DDoS Threat Intelligence and Collaborative Data Sharing

In today's interconnected digital landscape, distributed denial of service (DDoS) attacks pose a significant threat to organizations of all sizes. To effectively combat…